[Bug 254675] ICMP Unreach needfrag is broken in 13.0-RC4

2021-03-31 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=254675 Alexander V. Chernikov changed: What|Removed |Added Assignee|b...@freebsd.org|n...@freebsd.org -- You

[Bug 254675] ICMP Unreach needfrag is broken in 13.0-RC4

2021-03-31 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=254675 --- Comment #3 from Alexander V. Chernikov --- For the context, we have switched fastforwarding on by default: https://cgit.freebsd.org/src/commit/?id=8ad114c082a159c0dde95aa35d2e3e108aa30a75 In 12.2 the codepath was ip_input() -> ip_forwa

[Bug 254675] ICMP Unreach needfrag is broken in 13.0-RC4

2021-03-31 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=254675 Marek Zarychta changed: What|Removed |Added CC||zarych...@plan-b.pwste.edu.

[Bug 254675] ICMP Unreach needfrag is broken in 13.0-RC4

2021-03-31 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=254675 --- Comment #1 from Aleksandr Fedorov --- This is very funny: root@GW_13RC4:~ # tcpdump -i lo0 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on lo0, link-type NULL (BSD loopback), capture size 262144

[Bug 254675] ICMP Unreach needfrag is broken in 13.0-RC4

2021-03-31 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=254675 Bug ID: 254675 Summary: ICMP Unreach needfrag is broken in 13.0-RC4 Product: Base System Version: 13.0-STABLE Hardware: Any OS: Any Status: New Seve